Skip to main content

Network Assurance and Security Services in Ubiquitous Environments

  1. UMTS-WLAN heterogeneous mobile networks allow a single mobile user with different radio technologies to access different mobile networks, but how to secure such interworking networks and provide a seamless ser...

    Authors: Shen-Ho Lin, Jung-Hui Chiu and Sung-Shiou Shen
    Citation: EURASIP Journal on Wireless Communications and Networking 2011 2011:124
  2. Policy inconsistencies may arise between safety and utility policies due to their opposite objectives. In this work we provide a formal examination of policy inconsistencies resolution for the coexistence of s...

    Authors: Jianfeng Lu, Ruixuan Li, Jinwei Hu and Dewu Xu
    Citation: EURASIP Journal on Wireless Communications and Networking 2011 2011:101
  3. This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. Compared with the related schemes, the proposed scheme achieves the following three ma...

    Authors: Eun-Jun Yoon, Kee-Young Yoo, Jeong-Woo Hong, Sang-Yoon Yoon, Dong-In Park and Myung-Jin Choi
    Citation: EURASIP Journal on Wireless Communications and Networking 2011 2011:86
  4. The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging app...

    Authors: Surya Nepal, John Zic, Dongxi Liu and Julian Jang
    Citation: EURASIP Journal on Wireless Communications and Networking 2011 2011:75
  5. This paper highlights the importance of the interoperability of the encrypted DB in terms of the characteristics of DB and efficient schemes. Although most prior researches have developed efficient algorithms ...

    Authors: Hyun-A Park, Jae Hyun Park and Dong Hoon Lee
    Citation: EURASIP Journal on Wireless Communications and Networking 2011 2011:64
  6. Distributed denial of service (DDoS) attacks, which are a major threat on the Internet, have recently become more sophisticated as a result of their ability to exploit application-layer vulnerabilities. Most d...

    Authors: Sangjae Lee, Gisung Kim and Sehun Kim
    Citation: EURASIP Journal on Wireless Communications and Networking 2011 2011:50
  7. A number of disasters in various places of the planet have caused an extensive loss of lives, severe damages to properties and the environment, as well as a tremendous shock to the survivors. For relief and mi...

    Authors: Alexandros G. Fragkiadakis, Ioannis G. Askoxylakis, Elias Z. Tragos and Christos V. Verikoukis
    Citation: EURASIP Journal on Wireless Communications and Networking 2011 2011:13